{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:15:10Z","timestamp":1755998110265,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T00:00:00Z","timestamp":1572134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research Fund KU Leuven"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,27]]},"DOI":"10.1145\/3342559.3365338","type":"proceedings-article","created":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T21:18:24Z","timestamp":1573852704000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards a standards-compliant pure-software trusted execution environment for resource-constrained embedded devices"],"prefix":"10.1145","author":[{"given":"Hassaan","family":"Janjua","sequence":"first","affiliation":[{"name":"KU Leuven"}]},{"given":"Mahmoud","family":"Ammar","sequence":"additional","affiliation":[{"name":"KU Leuven"}]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[{"name":"KU Leuven and University of Trento, Italy"}]},{"given":"Danny","family":"Hughes","sequence":"additional","affiliation":[{"name":"KU Leuven"}]}],"member":"320","published-online":{"date-parts":[[2019,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2905020"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAIE.2011.6162150"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2928541"},{"key":"e_1_3_2_1_4_1","unstructured":"ARM Limited. 2008. Security technology: building a secure system using Trust-Zone technology. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.prd29-genc-009492c\/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf. [Online; accessed 15-July-2019].  ARM Limited. 2008. Security technology: building a secure system using Trust-Zone technology. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.prd29-genc-009492c\/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf. [Online; accessed 15-July-2019]."},{"volume-title":"AVR ATmega 1284p 8-bit microcontroller. htttp:\/\/ww1.microchip.com\/downloads\/en\/DeviceDoc\/doc8059.pdf. [Online","year":"2019","key":"e_1_3_2_1_5_1","unstructured":"Atmel. 2009. AVR ATmega 1284p 8-bit microcontroller. htttp:\/\/ww1.microchip.com\/downloads\/en\/DeviceDoc\/doc8059.pdf. [Online ; accessed 30- July - 2019 ]. Atmel. 2009. AVR ATmega 1284p 8-bit microcontroller. htttp:\/\/ww1.microchip.com\/downloads\/en\/DeviceDoc\/doc8059.pdf. [Online; accessed 30-July-2019]."},{"key":"e_1_3_2_1_6_1","volume-title":"RFC 7228: Terminology for Constrained-Node Networks. IETF Request For Comments","author":"Bormann C","year":"2014","unstructured":"C Bormann , Mehmet Ersue , and Ari Keranen . 2014. RFC 7228: Terminology for Constrained-Node Networks. IETF Request For Comments ( 2014 ). C Bormann, Mehmet Ersue, and Ari Keranen. 2014. RFC 7228: Terminology for Constrained-Node Networks. IETF Request For Comments (2014)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"e_1_3_2_1_8_1","volume-title":"SANCTUARY: ARMing TrustZone with User-space Enclaves.. In NDSS.","author":"Brasser Ferdinand","year":"2019","unstructured":"Ferdinand Brasser , David Gens , Patrick Jauernig , Ahmad-Reza Sadeghi , and Emmanuel Stapf . 2019 . SANCTUARY: ARMing TrustZone with User-space Enclaves.. In NDSS. Ferdinand Brasser, David Gens, Patrick Jauernig, Ahmad-Reza Sadeghi, and Emmanuel Stapf. 2019. SANCTUARY: ARMing TrustZone with User-space Enclaves.. In NDSS."},{"key":"e_1_3_2_1_9_1","volume-title":"Sanctum: Minimal hardware extensions for strong software isolation. In 25th {USENIX} Security Symposium ({USENIX} Security 16). 857--874.","author":"Costan Victor","year":"2016","unstructured":"Victor Costan , Ilia Lebedev , and Srinivas Devadas . 2016 . Sanctum: Minimal hardware extensions for strong software isolation. In 25th {USENIX} Security Symposium ({USENIX} Security 16). 857--874. Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal hardware extensions for strong software isolation. In 25th {USENIX} Security Symposium ({USENIX} Security 16). 857--874."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154448.3154454"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098261"},{"key":"e_1_3_2_1_12_1","volume-title":"19th NDSS Symposium. The Internet Society.","author":"Eldefrawy Karim","year":"2012","unstructured":"Karim Eldefrawy , Gene Tsudik , Aur\u00e9lien Francillon , and Daniele Perito . 2012 . SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust .. In 19th NDSS Symposium. The Internet Society. Karim Eldefrawy, Gene Tsudik, Aur\u00e9lien Francillon, and Daniele Perito. 2012. SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust.. In 19th NDSS Symposium. The Internet Society."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132782"},{"volume-title":"Intel Software Guard Extensions Programming Reference. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf. [Online","year":"2019","key":"e_1_3_2_1_14_1","unstructured":"Intel. 2014. Intel Software Guard Extensions Programming Reference. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf. [Online ; accessed 15- July - 2019 ]. Intel. 2014. Intel Software Guard Extensions Programming Reference. https:\/\/software.intel.com\/sites\/default\/files\/managed\/48\/88\/329298-002.pdf. [Online; accessed 15-July-2019]."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18051364"},{"key":"e_1_3_2_1_16_1","first-page":"2011","article-title":"SC22\/WG14","volume":"9899","author":"Jtc ISO","year":"2011","unstructured":"ISO Jtc . 2011 . SC22\/WG14 . ISO\/IEC 9899 : 2011 . Information technology---Programming languages---C. http:\/\/www.iso.org\/iso\/iso_catalogue\/catalogue_tc\/catalogue_detail.htm (2011). ISO Jtc. 2011. SC22\/WG14. ISO\/IEC 9899: 2011. Information technology---Programming languages---C. http:\/\/www.iso.org\/iso\/iso_catalogue\/catalogue_tc\/catalogue_detail.htm (2011).","journal-title":"ISO\/IEC"},{"key":"e_1_3_2_1_17_1","volume-title":"AMD memory encryption. White paper","author":"Kaplan David","year":"2016","unstructured":"David Kaplan , Jeremy Powell , and Tom Woller . 2016. AMD memory encryption. White paper ( 2016 ). David Kaplan, Jeremy Powell, and Tom Woller. 2016. AMD memory encryption. White paper (2016)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592824"},{"volume-title":"Sensing, Communication, and Networking (SECON)","author":"Matthys Nelson","key":"e_1_3_2_1_19_1","unstructured":"Nelson Matthys , Fan Yang , Wilfried Daniels , Wouter Joosen , and Danny Hughes . 2016. Demonstration of micropnp: the zero-configuration wireless sensing and actuation platform . In Sensing, Communication, and Networking (SECON) . IEEE. Nelson Matthys, Fan Yang, Wilfried Daniels, Wouter Joosen, and Danny Hughes. 2016. Demonstration of micropnp: the zero-configuration wireless sensing and actuation platform. In Sensing, Communication, and Networking (SECON). IEEE."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.400"},{"key":"e_1_3_2_1_21_1","volume-title":"Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, and Frank Piessens.","author":"Noorman Job","year":"2013","unstructured":"Job Noorman , Pieter Agten , Wilfried Daniels , Raoul Strackx , Anthony Van Herrewege , Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, and Frank Piessens. 2013 . Sancus : Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13). 479--498. Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, and Frank Piessens. 2013. Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13). 479--498."},{"key":"e_1_3_2_1_22_1","volume-title":"VRASED: A Verified Hardware\/Software Co-Design for Remote Attestation. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 1429--1446.","author":"Oliveira Nunes Ivan De","year":"2019","unstructured":"Ivan De Oliveira Nunes , Karim Eldefrawy , Norrathep Rattanavipanon , Michael Steiner , and Gene Tsudik . 2019 . VRASED: A Verified Hardware\/Software Co-Design for Remote Attestation. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 1429--1446. Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, and Gene Tsudik. 2019. VRASED: A Verified Hardware\/Software Co-Design for Remote Attestation. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 1429--1446."},{"key":"e_1_3_2_1_23_1","unstructured":"Global Platform. 2010. TEE Client API Specification v1.0. https:\/\/globalplatform.org\/specs-library\/tee-client-api-specification\/  Global Platform. 2010. TEE Client API Specification v1.0. https:\/\/globalplatform.org\/specs-library\/tee-client-api-specification\/"},{"key":"e_1_3_2_1_24_1","unstructured":"Global Platform. 2018. Introduction to Trusted Execution Environments. https:\/\/globalplatform.org\/wp-content\/uploads\/2018\/05\/Introduction-to-Trusted-Execution-Environment-15May2018.pdf  Global Platform. 2018. Introduction to Trusted Execution Environments. https:\/\/globalplatform.org\/wp-content\/uploads\/2018\/05\/Introduction-to-Trusted-Execution-Environment-15May2018.pdf"},{"key":"e_1_3_2_1_25_1","unstructured":"Global Platform. 2018. TEE Internal Core API Specification. https:\/\/globalplatform.org\/wp-content\/uploads\/2018\/06\/GPD_TEE_Internal_Core_API_Specification_v1.1.2.50_PublicReview.pdf  Global Platform. 2018. TEE Internal Core API Specification. https:\/\/globalplatform.org\/wp-content\/uploads\/2018\/06\/GPD_TEE_Internal_Core_API_Specification_v1.1.2.50_PublicReview.pdf"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2878777"},{"key":"e_1_3_2_1_27_1","volume-title":"ARMv8-M architecture technical overview. ARM WHITE PAPER","author":"Yiu Joseph","year":"2015","unstructured":"Joseph Yiu . 2015. ARMv8-M architecture technical overview. ARM WHITE PAPER ( 2015 ). Joseph Yiu. 2015. ARMv8-M architecture technical overview. ARM WHITE PAPER (2015)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236010"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134043"}],"event":{"name":"SOSP '19: ACM SIGOPS 27th Symposium on Operating Systems Principles","acronym":"SOSP '19","location":"Huntsville Ontario Canada"},"container-title":["Proceedings of the 4th Workshop on System Software for Trusted Execution"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342559.3365338","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3342559.3365338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:01Z","timestamp":1750202581000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342559.3365338"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,27]]},"references-count":29,"alternative-id":["10.1145\/3342559.3365338","10.1145\/3342559"],"URL":"https:\/\/doi.org\/10.1145\/3342559.3365338","relation":{},"subject":[],"published":{"date-parts":[[2019,10,27]]},"assertion":[{"value":"2019-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}